Skip to content

Methodology

Our methodology for selecting protocols follows a rigorous evaluation process based on four key criteria:

CriteriaDescription
Safety ScoreAudit history, TVL persistence, oracle robustness.
Yield SustainabilitySource of yield (fees vs. emissions), incentive decay curves.
Diversification ValueCorrelation to existing asset exposure.
Operational FitAvailability of programmatic rebalancing hooks and granular APIs.

We employ sophisticated position management techniques to optimize yield while protecting your capital:

An on‑chain agent that tilts allocations toward the best Sharpe‑adjusted opportunities every epoch.

If LTV on any leveraged leg drifts > 70%, collateral is partially unwound using flash-loans before liquidation triggers.

Surplus fees from Conservative vaults can be routed to backstop Aggressive vault liquidations during tail events.

All integration points with third-party protocols undergo rigorous security reviews before deployment. Our security measures include:

  • Independent security audits for all vaults
  • Multi-signature controls on key operations
  • Continuous monitoring of integrated protocols
  • Regular stress testing of liquidation scenarios

We prioritize complete transparency in all our operations:

  • Real‑time strategy weights and vault addresses are published on the Transparency Hub.
  • APY is reported net of fees and follows the same time‑weighted method disclosed in our docs.
  • Historical performance CSVs can be downloaded for independent analysis.